aws-sdk-s3control 1.75.0 → 1.77.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-s3control/client.rb +1 -1
- data/lib/aws-sdk-s3control/endpoint_provider.rb +27 -9
- data/lib/aws-sdk-s3control/plugins/endpoints.rb +1 -0
- data/lib/aws-sdk-s3control.rb +1 -1
- data/sig/client.rbs +1694 -0
- data/sig/errors.rbs +50 -0
- data/sig/resource.rbs +80 -0
- data/sig/types.rbs +1969 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2b6fd9e949a13c86a0ddd5833d7433685bf185658215751099ab27720fb4136e
|
4
|
+
data.tar.gz: fcd641db2b9432f4f6bf4471a212c908556075b69ed173e41840f271970a856a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 75d7ecbd6fc45f4523e4f7749fc4be3f64d9a55a6974f27a6804efb3268d42d4d5d75b0e23be82102182d275fc3228888cd018e216d82c7198b95a47e5e50074
|
7
|
+
data.tar.gz: 36d94967d5dec75e0a698ca0fbef4ad03159e7a596c749d3891132e72031d1eff4e40bef84e66b91d682376604062e540ca97ec873f3fa6af14de1565931144a
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.77.0 (2024-01-26)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.76.0 (2024-01-12)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - S3 On Outposts team adds dualstack endpoints support for S3Control and S3Outposts API calls.
|
13
|
+
|
4
14
|
1.75.0 (2023-12-20)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.77.0
|
@@ -7579,7 +7579,7 @@ module Aws::S3Control
|
|
7579
7579
|
params: params,
|
7580
7580
|
config: config)
|
7581
7581
|
context[:gem_name] = 'aws-sdk-s3control'
|
7582
|
-
context[:gem_version] = '1.
|
7582
|
+
context[:gem_version] = '1.77.0'
|
7583
7583
|
Seahorse::Client::Request.new(handlers, context)
|
7584
7584
|
end
|
7585
7585
|
|
@@ -46,16 +46,22 @@ module Aws::S3Control
|
|
46
46
|
if Aws::Endpoints::Matchers.not(Aws::Endpoints::Matchers.valid_host_label?(outpost_id, false))
|
47
47
|
raise ArgumentError, "OutpostId must only contain a-z, A-Z, 0-9 and `-`."
|
48
48
|
end
|
49
|
+
if Aws::Endpoints::Matchers.set?(endpoint) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
50
|
+
raise ArgumentError, "Invalid Configuration: DualStack and custom endpoint are not supported"
|
51
|
+
end
|
49
52
|
if Aws::Endpoints::Matchers.valid_host_label?(region, true)
|
50
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
51
|
-
raise ArgumentError, "Invalid configuration: Outposts do not support dual-stack"
|
52
|
-
end
|
53
53
|
if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
|
54
54
|
return Aws::Endpoints::Endpoint.new(url: "#{url['scheme']}://#{url['authority']}#{url['path']}", headers: {}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{region}"}]})
|
55
55
|
end
|
56
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
57
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{region}"}]})
|
58
|
+
end
|
56
59
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
57
60
|
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{region}"}]})
|
58
61
|
end
|
62
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
63
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{region}"}]})
|
64
|
+
end
|
59
65
|
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{region}"}]})
|
60
66
|
end
|
61
67
|
raise ArgumentError, "Invalid region: region was not a valid DNS name."
|
@@ -64,11 +70,11 @@ module Aws::S3Control
|
|
64
70
|
if Aws::Endpoints::Matchers.set?(access_point_name) && (access_point_arn = Aws::Endpoints::Matchers.aws_parse_arn(access_point_name))
|
65
71
|
if (arn_type = Aws::Endpoints::Matchers.attr(access_point_arn, "resourceId[0]")) && Aws::Endpoints::Matchers.not(Aws::Endpoints::Matchers.string_equals?(arn_type, ""))
|
66
72
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(access_point_arn, "service"), "s3-outposts")
|
67
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
68
|
-
raise ArgumentError, "Invalid configuration: Outpost Access Points do not support dual-stack"
|
69
|
-
end
|
70
73
|
if (outpost_id = Aws::Endpoints::Matchers.attr(access_point_arn, "resourceId[1]"))
|
71
74
|
if Aws::Endpoints::Matchers.valid_host_label?(outpost_id, false)
|
75
|
+
if Aws::Endpoints::Matchers.set?(endpoint) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
76
|
+
raise ArgumentError, "Invalid Configuration: DualStack and custom endpoint are not supported"
|
77
|
+
end
|
72
78
|
if Aws::Endpoints::Matchers.set?(use_arn_region) && Aws::Endpoints::Matchers.boolean_equals?(use_arn_region, false) && Aws::Endpoints::Matchers.not(Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(access_point_arn, "region"), "#{region}"))
|
73
79
|
raise ArgumentError, "Invalid configuration: region from ARN `#{access_point_arn['region']}` does not match client region `#{region}` and UseArnRegion is `false`"
|
74
80
|
end
|
@@ -84,9 +90,15 @@ module Aws::S3Control
|
|
84
90
|
if (outpost_type = Aws::Endpoints::Matchers.attr(access_point_arn, "resourceId[2]"))
|
85
91
|
if (access_point_name = Aws::Endpoints::Matchers.attr(access_point_arn, "resourceId[3]"))
|
86
92
|
if Aws::Endpoints::Matchers.string_equals?(outpost_type, "accesspoint")
|
93
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
94
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{access_point_arn['region']}.#{arn_partition['dualStackDnsSuffix']}", headers: {"x-amz-account-id"=>["#{access_point_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{access_point_arn['region']}"}]})
|
95
|
+
end
|
87
96
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
88
97
|
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{access_point_arn['region']}.#{arn_partition['dnsSuffix']}", headers: {"x-amz-account-id"=>["#{access_point_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{access_point_arn['region']}"}]})
|
89
98
|
end
|
99
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
100
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts.#{access_point_arn['region']}.#{arn_partition['dualStackDnsSuffix']}", headers: {"x-amz-account-id"=>["#{access_point_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{access_point_arn['region']}"}]})
|
101
|
+
end
|
90
102
|
if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
|
91
103
|
return Aws::Endpoints::Endpoint.new(url: "#{url['scheme']}://#{url['authority']}#{url['path']}", headers: {"x-amz-account-id"=>["#{access_point_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{access_point_arn['region']}"}]})
|
92
104
|
end
|
@@ -118,11 +130,11 @@ module Aws::S3Control
|
|
118
130
|
if Aws::Endpoints::Matchers.set?(bucket) && (bucket_arn = Aws::Endpoints::Matchers.aws_parse_arn(bucket))
|
119
131
|
if (arn_type = Aws::Endpoints::Matchers.attr(bucket_arn, "resourceId[0]")) && Aws::Endpoints::Matchers.not(Aws::Endpoints::Matchers.string_equals?(arn_type, ""))
|
120
132
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(bucket_arn, "service"), "s3-outposts")
|
121
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
122
|
-
raise ArgumentError, "Invalid configuration: Outpost buckets do not support dual-stack"
|
123
|
-
end
|
124
133
|
if (outpost_id = Aws::Endpoints::Matchers.attr(bucket_arn, "resourceId[1]"))
|
125
134
|
if Aws::Endpoints::Matchers.valid_host_label?(outpost_id, false)
|
135
|
+
if Aws::Endpoints::Matchers.set?(endpoint) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
136
|
+
raise ArgumentError, "Invalid Configuration: DualStack and custom endpoint are not supported"
|
137
|
+
end
|
126
138
|
if Aws::Endpoints::Matchers.set?(use_arn_region) && Aws::Endpoints::Matchers.boolean_equals?(use_arn_region, false) && Aws::Endpoints::Matchers.not(Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(bucket_arn, "region"), "#{region}"))
|
127
139
|
raise ArgumentError, "Invalid configuration: region from ARN `#{bucket_arn['region']}` does not match client region `#{region}` and UseArnRegion is `false`"
|
128
140
|
end
|
@@ -138,9 +150,15 @@ module Aws::S3Control
|
|
138
150
|
if (outpost_type = Aws::Endpoints::Matchers.attr(bucket_arn, "resourceId[2]"))
|
139
151
|
if (bucket_name = Aws::Endpoints::Matchers.attr(bucket_arn, "resourceId[3]"))
|
140
152
|
if Aws::Endpoints::Matchers.string_equals?(outpost_type, "bucket")
|
153
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
154
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{bucket_arn['region']}.#{arn_partition['dualStackDnsSuffix']}", headers: {"x-amz-account-id"=>["#{bucket_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{bucket_arn['region']}"}]})
|
155
|
+
end
|
141
156
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
142
157
|
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts-fips.#{bucket_arn['region']}.#{arn_partition['dnsSuffix']}", headers: {"x-amz-account-id"=>["#{bucket_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{bucket_arn['region']}"}]})
|
143
158
|
end
|
159
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
160
|
+
return Aws::Endpoints::Endpoint.new(url: "https://s3-outposts.#{bucket_arn['region']}.#{arn_partition['dualStackDnsSuffix']}", headers: {"x-amz-account-id"=>["#{bucket_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{bucket_arn['region']}"}]})
|
161
|
+
end
|
144
162
|
if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
|
145
163
|
return Aws::Endpoints::Endpoint.new(url: "#{url['scheme']}://#{url['authority']}#{url['path']}", headers: {"x-amz-account-id"=>["#{bucket_arn['accountId']}"], "x-amz-outpost-id"=>["#{outpost_id}"]}, properties: {"authSchemes"=>[{"disableDoubleEncoding"=>true, "name"=>"sigv4", "signingName"=>"s3-outposts", "signingRegion"=>"#{bucket_arn['region']}"}]})
|
146
164
|
end
|
@@ -14,6 +14,7 @@ module Aws::S3Control
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::S3Control::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|